Here are the fresh stories about product updates.

The EU’s General Data Protection Regulation (GDPR) has been called the largest change to data protections in a generation. It is causing major disruption to how companies manage customer data in — and outside of — the EU. Not only is the new legislation incredibly far reaching, it is also lengthy and complex. We’ve curated the top 10 GDPR frameworks to organize your efforts to comply with GDPR requirements.

Your first question – does this apply to me? If you are keeping personal data on European citizens (including emails), you are subject to these regulations. If you fail to comply by May 25, 2018, the penalties are up to €20m (or more for companies over €500m total revenue).

Here are the fresh stories about product updates.

Is GDPR compliance keeping you up at night? If so, you are not alone, and your fears are not entirely unfounded. But help is on the way: we have curated the Top 10 GDPR Guides. If you maintain or process data on European customers, these resources will be great frameworks and instructions to prepare your company for compliance.

Happy New Year to all!

In the last decade, we have all watched cloud adoption continue to explode, with this year’s SaaS growth expected to increase 20 percent to $46.3 billion. SaaS has been growing so fast for so many years that it seems like old news. In reality, that SaaS growth has made cloud software applications into a big line item on the budget, and a big set of security headaches.

Smart companies are committing to take control of SaaS in 2018 to get a handle on costs and security — starting with understanding their SaaS landscape.

Here are the fresh stories about product updates.

If you are running G Suite, you’ve likely noticed how incredibly easy it is for your users to allow access to sensitive information. We have seen notable cases like this and this where seemingly innocuous permissions have resulted in significant data breaches.

Why does this happen?

Google and third party apps have prioritized user adoption and ease of use. This has led to the unintended consequence of easily allowing users to provide access to their data — and at work, that may mean sensitive company data.